SlideShare a Scribd company logo
1 of 14
Download to read offline
Netop – VPN Survey
Deployed to Spiceworks Voice of IT panel
in February 2014; 192 respondents in the United States
Executive Summary
IN THIS REPORT
Configuring a New VPN 3
Time Spent Maintaining
Existing VPNs 4
Type of VPN Solution 5
Accessing Applications 6
Vendor Access to Network 7
Types of Authentication 8
Number of Remote
Devices Supported 9
Effectiveness of Current
VPN Solution 10
Limitations of VPNs 11
Interest in an Alternative
VPN Solution 12
Respondent Profile 13
In February 2014, Spiceworks Voice of IT surveyed 192 IT pros in the US to learn how they
manage VPN and the challenges experienced with their current solution. To qualify for the
survey, they must be the person responsible for managing or supporting their organization’s
VPN solution.
Key findings of this report include:
• Roughly three-quarters of respondents have set up a VPN in the past year.
• The majority state their organization uses a firewall based service for their VPN solution, while
26% use a server based service. Further, most employ Internet Protocol Security (IPsec) (68%)
and / or Transport Layer Security (SSL/TLS) (52%) for a VPN security protocol.
• Respondents are evenly split on whether they allow their vendors and / or trusted third
parties VPN access to their organization’s network. Nearly two-thirds of the respondents who
allow VPN access state their vendors can access department-specific business applications
(i.e. database software, accounting software).
• Three-quarters believe their VPN solution is very to extremely effective at providing
employees remote access to their organization’s intranet. Respondents also feel it’s very to
extremely effective at connecting multiple locations (63%) and pulling data for reports (47%).
• When asked about the greatest limitations of VPNs, nearly half state that the difficulty for
employees to connect remotely is the greatest limitation. Other limitations are reliability of
connection (35%), degree of expertise needed to configure (27%) and logging use (26%).
• When asked how interested they would be in a product that replicates the functions of a
VPN (but is easier to use and maintain), 47% indicate they’re somewhat interested, and 14%
are very to extremely interested.
The following pages provide detailed findings for all questions in the study.
About Spiceworks Voice of IT®
The Spiceworks Voice of IT® market insights program publishes stats, trends and opinions collected from small and medium business technology
professionals who are among the more than 2.5M users of Spiceworks. Survey panelists opt-in to answer questions on technology trends important
to them.
To use data from this report, visit: www.spiceworks.com/voice-of-it/terms
2
To qualify for the survey, respondents must be the person responsible for managing or supporting
their organization’s VPN solution.
Of those who qualified, roughly three-quarters (76%) state they’ve set up a VPN in the past year.
However, 24% state they haven’t set one up in the past year.
When asked how much time they estimate it would take to configure a new VPN, 31% believe it
would take less than 15 minutes, 17% indicate 15 to 29 minutes, 29% indicate 30 minutes to an hour,
and 17% indicate it would take more than an hour.
Have you set up a VPN in the past year?
Configuring a New VPN
Respondents = 191
3
Yes
76%
No
24%
Respondents = 192
How much time do you estimate it would take you
to configure a new VPN?
6%
17%
29%
17%
23%
8%
0% 10% 20% 30% 40%
Don’t know
More than an hour
30 minutes to an hour
15 to 29 minutes
5 to 14 minutes
Less than 5 minutes
Time Spent Maintaining Existing VPNs
When it comes to maintaining existing VPNs and managing user rights pertaining to VPNs, more than
two-thirds (69%) state it takes less than an hour each month, while 26% indicate one to four hours,
and 4% indicate more than four hours each month.
How much time do you spend each month maintaining existing VPNs and
managing user rights pertaining to VPNs?
Respondents = 192
4
1%
1%
3%
26%
69%
0% 10% 20% 30% 40% 50% 60% 70% 80%
Don't know
More than 10 hours each month
4 to 10 hours each month
1 to 4 hours each month
Less than an hour each month
Type of VPN Solution
The majority of respondents (72%) state their organization uses a firewall based service for their VPN
solution, while 26% use a server based service.
Most respondents state their organization uses Internet Protocol Security (IPsec) (68%) and / or
Transport Layer Security (SSL/TLS) (52%). Other protocols used are Secure Shell VPN (SSH) (20%) and
Microsoft Point-to-Point Tunneling Protocol (17%).
What type of VPN solution does your company use?
(Select all that apply.)
Respondents = 192
Which of the following VPN security protocols does your
company employ? (Select all that apply.)
Respondents = 191
5
6%
7%
26%
72%
0% 20% 40% 60% 80%
Other
External VPN Service
Provider
Server based service
Firewall based service
3%
1%
2%
6%
17%
20%
52%
68%
0% 10% 20% 30% 40% 50% 60% 70% 80%
Other
Multi Path Virtual Private Network
(MPVPN)
Datagram Transport Layer Security
(DTLS)
Microsoft Secure Socket Tunneling
Protocol
Microsoft Point-to-Point Tunneling
Protocol
Secure Shell VPN (SSH)
Transport Layer Security (SSL/TLS)
Internet Protocol Security (IPsec)
Respondents = 191
The majority of respondents state their organization’s employees use the VPN tunnel for file sharing
(80%) and department specific (72%) applications. Other applications include Email (50%) and
Internal web portal (40%). Sixteen percent indicate “other,” and these verbatim responses are
included in the Excel file provided.
What applications do your employees use through your VPN tunnel?
(Select all that apply.)
Accessing Applications
6
16%
20%
21%
40%
50%
72%
80%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90%
Other
Collaboration software (i.e. SharePoint)
Communication software (i.e. IM tool)
Internal web portal
Email
Department-specific (i.e. database software,
accounting software)
File sharing
Vendor Access to Network
Respondents are evenly split on whether they allow any of their vendors and / or trusted third parties
VPN access to their organization’s network.
Of the 50% of respondents who allow VPN access, 65% allow vendors access to department-specific
business applications (i.e. database software, accounting software). Other programs or systems are
FTP / other file sharing (32%) and collaboration software (19%). Twenty-two percent indicate “other,”
and these verbatim responses are included in the Excel file provided.
Do you allow any of your vendors and/or trusted
3rd parties VPN access to your network?
Respondents = 192
What programs or systems are the vendors accessing?
(Select all that apply.)
Respondents = 95
7
Of IT pros who indicate vendors / 3rd parties have access
Yes
50%
No
50%
22%
8%
14%
14%
19%
32%
65%
0% 10% 20% 30% 40% 50% 60% 70%
Other
Point of sale systems
Email
HVAC, building automation or
other facilities systems
Collaboration software
FTP / Other file sharing
Department-specific business
applications
Types of Authentication
Nearly all respondents (93%) use passwords for authentication, while an additional 29% use two-factor
authentication.
Further, the majority (89%) state this authentication is standardized across all VPNs in their
organization.
What types of authentication do you use with VPN
connections? (Select all that apply.)
Respondents = 191
Is authentication standardized across all VPNs in your
organization?
Respondents = 191
8
3%
1%
29%
93%
0% 20% 40% 60% 80% 100%
Other
Biometrics
Two-factor authentication
Passwords
Yes
89%
No
11%
Respondents = 191
When asked how many remote devices they support, three-quarters indicate they support one to
100 remote devices. However, 20% support more than 100 devices, and 4% indicate they don’t
support remote devices.
How many remote devices do you and your team support?
Number of Remote Devices Supported
9
4%
75%
17%
3% 1%
0%
10%
20%
30%
40%
50%
60%
70%
80%
None 1-100 101-1000 More than 1000 Don't know
Respondents = 186-188
Three-quarters of respondents believe their VPN solution is very to extremely effective at providing
employees remote access to their organization’s intranet. Respondents also feel it’s very to
extremely effective at connecting multiple locations (63%) and pulling data for reports (47%).
Using a scale of 1 to 5, where 1 is not at all effective and 5 is extremely effective, please rank how
effective your VPN solution is at the following:
Effectiveness of Current VPN Solution
Weighted Average Top Two
(Very to
extremely
effective)
Bottom Two
(Not very to
not at all
effective)
Not
applicable
Providing access to
our intranet to
employees when
away from the office
75% 3% 9%
Connecting multiple
geographic locations
63% 5% 24%
Pulling data for reports 47% 14% 19%
Extending GUIs to end
users
42% 10% 35%
Connecting
unattended devices
34% 11% 35%
Accessing a VOIP
system
23% 14% 52%
Scale: (1) Not at all effective, (2) Not very effective, (3) Somewhat effective, (4) Very effective, (5) Extremely effective
10
1.6
2.3
2.4
3.0
3.2
3.9
0.0 1.0 2.0 3.0 4.0 5.0
Accessing a VOIP system
Connecting unattended devices
Extending GUIs to end users
Pulling data for reports
Connecting multiple geographic
locations
Providing access to our intranet to
employees when away from the office
Respondents = 184
Nearly half (47%) state that the difficulty for employees to connect remotely is the greatest limitation
of VPNs. Other limitations are reliability of connection (35%), degree of expertise needed to
configure (27%) and logging use (26%).
Which of the following do you consider to be the greatest limitation of VPNs?
(Select all that apply.)
Limitations of VPNs
11
47%
35%
27% 26%
22% 22%
20%
8%
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
50%
Employee
difficulty
connecting
remotely
Reliability of
connection
Degree of
expertise
needed to
configure
Logging use Ease of use Level of
security
Managing
user access
rights
Other
When asked how interested they would be in a product that replicates the functions of a VPN (but is
easier to use and maintain), 47% indicate they’re somewhat interested, and 14% are very to
extremely interested. However, 39% indicate they’re not at all to not very interested.
How interested would you be in a product that replicated the functions of a VPN but was easier to
use and maintain and allowed port-specific access?
Interest in an Alternative VPN Solution
Respondents = 192
12
16%
23%
47%
9%
5%
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
50%
Not at all interested Not very interested Somewhat interested Very interested Extremely interested
Respondent Profile
Company Size Industry
Total = 192
Top 16 industries are shown
Total = 192
13
5%
8%
8%
30%
35%
14%
0% 10% 20% 30% 40%
1000 or more
500-999
250-499
100-249
20-99
1-19
2%
2%
3%
3%
3%
3%
3%
5%
5%
6%
6%
7%
7%
9%
10%
16%
0% 5% 10% 15% 20%
Insurance
Transportation
Construction
Software
Consulting
Energy
Legal
Education
Retail
Engineering
Finance
Government
Non profit
IT service provider
Healthcare
Manufacturing
Copyright Notice
The contents of this report are a result of primary research performed by Spiceworks. Unless otherwise noted, the entire contents
distributed as part of this report are copyrighted by Spiceworks. As such any information made available by any means in this report may
not be copied, reproduced, duplicated, published, displayed, transmitted, distributed, given, sold, traded, resold, marketed, offered for sale,
modified to create derivative works or otherwise exploited for valuable consideration without prior written consent by Spiceworks. For
information about using data from this report visit, go to www.spiceworks.com/voice-of-it/terms.
This report contains information of fact relating to parties other than Spiceworks. Although the information have been obtained from, and
are based on sources that Spiceworks believes to be reliable, Spiceworks does not guarantee the accuracy, and any such information might
be incomplete or condensed. Any estimates included in this report constitute Spiceworks’ judgment as of the date of compilation, and are
subject to change without notice. This report is for information purposes only. All responsibility for any interpretations or actions based on
the information or commentary contained within this report lies solely with the recipient.
All rights reserved. 2014.
14

More Related Content

Viewers also liked

1Q 2016 INVESTMENT OPPORTUNITIES
1Q 2016 INVESTMENT OPPORTUNITIES1Q 2016 INVESTMENT OPPORTUNITIES
1Q 2016 INVESTMENT OPPORTUNITIESBillion Estate
 
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015Andy Kim
 
Queue management system software
Queue management system softwareQueue management system software
Queue management system softwareAnne Cole
 
Graziella Dragoni - Obiettivo partecipare
Graziella Dragoni - Obiettivo partecipareGraziella Dragoni - Obiettivo partecipare
Graziella Dragoni - Obiettivo parteciparecorpomente
 
Adobe Experience Manager (Adobe CQ) Capabilities and Experience @ Neev
Adobe Experience Manager (Adobe CQ) Capabilities and Experience @ NeevAdobe Experience Manager (Adobe CQ) Capabilities and Experience @ Neev
Adobe Experience Manager (Adobe CQ) Capabilities and Experience @ NeevNeev Technologies
 
LAWRENCE NGUNJIRI MATHENGE final report
LAWRENCE NGUNJIRI  MATHENGE final reportLAWRENCE NGUNJIRI  MATHENGE final report
LAWRENCE NGUNJIRI MATHENGE final reportLawrence Ngunjiri
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)Chandan Jha
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefitsqaisar17
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentationstolentears
 
РИФ 2016, Глобальное обновление сайта Sberbank.ru: дизайн-поддержка, разработ...
РИФ 2016, Глобальное обновление сайта Sberbank.ru: дизайн-поддержка, разработ...РИФ 2016, Глобальное обновление сайта Sberbank.ru: дизайн-поддержка, разработ...
РИФ 2016, Глобальное обновление сайта Sberbank.ru: дизайн-поддержка, разработ...Тарасов Константин
 

Viewers also liked (20)

Elizabeth Ortiz_Resume
Elizabeth Ortiz_Resume Elizabeth Ortiz_Resume
Elizabeth Ortiz_Resume
 
1Q 2016 INVESTMENT OPPORTUNITIES
1Q 2016 INVESTMENT OPPORTUNITIES1Q 2016 INVESTMENT OPPORTUNITIES
1Q 2016 INVESTMENT OPPORTUNITIES
 
PDHPE
PDHPEPDHPE
PDHPE
 
Que es un blog
Que es un blogQue es un blog
Que es un blog
 
ielts certificate
ielts certificateielts certificate
ielts certificate
 
Tiang lampu taman antik
Tiang lampu taman antikTiang lampu taman antik
Tiang lampu taman antik
 
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015
 
Texto informativo - O avestruz
Texto informativo - O avestruzTexto informativo - O avestruz
Texto informativo - O avestruz
 
Smart restaurant
Smart restaurantSmart restaurant
Smart restaurant
 
Queue management system software
Queue management system softwareQueue management system software
Queue management system software
 
Graziella Dragoni - Obiettivo partecipare
Graziella Dragoni - Obiettivo partecipareGraziella Dragoni - Obiettivo partecipare
Graziella Dragoni - Obiettivo partecipare
 
Adobe Experience Manager (Adobe CQ) Capabilities and Experience @ Neev
Adobe Experience Manager (Adobe CQ) Capabilities and Experience @ NeevAdobe Experience Manager (Adobe CQ) Capabilities and Experience @ Neev
Adobe Experience Manager (Adobe CQ) Capabilities and Experience @ Neev
 
LAWRENCE NGUNJIRI MATHENGE final report
LAWRENCE NGUNJIRI  MATHENGE final reportLAWRENCE NGUNJIRI  MATHENGE final report
LAWRENCE NGUNJIRI MATHENGE final report
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
What Is VPN
What Is VPNWhat Is VPN
What Is VPN
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Vpn
VpnVpn
Vpn
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
РИФ 2016, Глобальное обновление сайта Sberbank.ru: дизайн-поддержка, разработ...
РИФ 2016, Глобальное обновление сайта Sberbank.ru: дизайн-поддержка, разработ...РИФ 2016, Глобальное обновление сайта Sberbank.ru: дизайн-поддержка, разработ...
РИФ 2016, Глобальное обновление сайта Sberbank.ru: дизайн-поддержка, разработ...
 

Similar to Netop VPN survey final report

Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1jmariani14
 
Idge dell server convergence2014 qp #2
Idge dell server convergence2014 qp #2Idge dell server convergence2014 qp #2
Idge dell server convergence2014 qp #2jmariani14
 
2018 Cloud Survey Results by Syncsort
2018 Cloud Survey Results by Syncsort2018 Cloud Survey Results by Syncsort
2018 Cloud Survey Results by SyncsortPrecisely
 
IT Executive Survey: Strategies for Monitoring IT Infrastructure & Services
IT Executive Survey: Strategies for Monitoring IT  Infrastructure & ServicesIT Executive Survey: Strategies for Monitoring IT  Infrastructure & Services
IT Executive Survey: Strategies for Monitoring IT Infrastructure & ServicesCA Technologies
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Enterprise Management Associates
 
IBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and DowntimeIBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and DowntimePrecisely
 
Network Transformation Survey 2015 Final Results
Network Transformation Survey 2015 Final ResultsNetwork Transformation Survey 2015 Final Results
Network Transformation Survey 2015 Final Resultsaccenture
 
Software Pricing and Licensing Survey Results and 2012 Predictions
Software Pricing and Licensing Survey Results and 2012 PredictionsSoftware Pricing and Licensing Survey Results and 2012 Predictions
Software Pricing and Licensing Survey Results and 2012 PredictionsFlexera
 
A CISO View on the State of Passwordless MFA
A CISO View on the State of Passwordless MFAA CISO View on the State of Passwordless MFA
A CISO View on the State of Passwordless MFASecret Double Octopus
 
The 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends ReportThe 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends ReportibossCyber
 
F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey ResultsF5 Networks
 
Software Advice IndustryView: What PSTN Users Want From VoIP Report
Software Advice IndustryView: What PSTN Users Want From VoIP ReportSoftware Advice IndustryView: What PSTN Users Want From VoIP Report
Software Advice IndustryView: What PSTN Users Want From VoIP ReportSoftware Advice
 
Suffering in Silence: Why Don’t Users Report MS Teams Performance Issues?
Suffering in Silence: Why Don’t Users Report MS Teams Performance Issues?Suffering in Silence: Why Don’t Users Report MS Teams Performance Issues?
Suffering in Silence: Why Don’t Users Report MS Teams Performance Issues?panagenda
 
IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM
 
Citrix Performance Management Report 2014
Citrix Performance Management Report 2014Citrix Performance Management Report 2014
Citrix Performance Management Report 2014eG Innovations
 
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the CloudThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the CloudThousandEyes
 
CompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in ReviewCompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in ReviewCompTIA
 
CompTIA: Trends in Cloud Computing
CompTIA: Trends in Cloud ComputingCompTIA: Trends in Cloud Computing
CompTIA: Trends in Cloud ComputingCompTIA
 
CompTIA Research Roundup - IT Channel Insights & Opportunities
CompTIA Research Roundup - IT Channel Insights & OpportunitiesCompTIA Research Roundup - IT Channel Insights & Opportunities
CompTIA Research Roundup - IT Channel Insights & OpportunitiesCompTIA
 

Similar to Netop VPN survey final report (20)

Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1
 
Idge dell server convergence2014 qp #2
Idge dell server convergence2014 qp #2Idge dell server convergence2014 qp #2
Idge dell server convergence2014 qp #2
 
2018 Cloud Survey Results by Syncsort
2018 Cloud Survey Results by Syncsort2018 Cloud Survey Results by Syncsort
2018 Cloud Survey Results by Syncsort
 
IT Executive Survey: Strategies for Monitoring IT Infrastructure & Services
IT Executive Survey: Strategies for Monitoring IT  Infrastructure & ServicesIT Executive Survey: Strategies for Monitoring IT  Infrastructure & Services
IT Executive Survey: Strategies for Monitoring IT Infrastructure & Services
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
 
IBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and DowntimeIBM Power Migration without the Risk and Downtime
IBM Power Migration without the Risk and Downtime
 
Network Transformation Survey 2015 Final Results
Network Transformation Survey 2015 Final ResultsNetwork Transformation Survey 2015 Final Results
Network Transformation Survey 2015 Final Results
 
Software Pricing and Licensing Survey Results and 2012 Predictions
Software Pricing and Licensing Survey Results and 2012 PredictionsSoftware Pricing and Licensing Survey Results and 2012 Predictions
Software Pricing and Licensing Survey Results and 2012 Predictions
 
A CISO View on the State of Passwordless MFA
A CISO View on the State of Passwordless MFAA CISO View on the State of Passwordless MFA
A CISO View on the State of Passwordless MFA
 
The 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends ReportThe 2018 Enterprise Cloud Trends Report
The 2018 Enterprise Cloud Trends Report
 
F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey Results
 
Software Advice IndustryView: What PSTN Users Want From VoIP Report
Software Advice IndustryView: What PSTN Users Want From VoIP ReportSoftware Advice IndustryView: What PSTN Users Want From VoIP Report
Software Advice IndustryView: What PSTN Users Want From VoIP Report
 
Suffering in Silence: Why Don’t Users Report MS Teams Performance Issues?
Suffering in Silence: Why Don’t Users Report MS Teams Performance Issues?Suffering in Silence: Why Don’t Users Report MS Teams Performance Issues?
Suffering in Silence: Why Don’t Users Report MS Teams Performance Issues?
 
IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer
 
Citrix Performance Management Report 2014
Citrix Performance Management Report 2014Citrix Performance Management Report 2014
Citrix Performance Management Report 2014
 
Big Data Impacts on Hybrid Infrastructure and Management
Big Data Impacts on Hybrid Infrastructure and ManagementBig Data Impacts on Hybrid Infrastructure and Management
Big Data Impacts on Hybrid Infrastructure and Management
 
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the CloudThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
ThousandEyes EMEA - Why 74% of IT Teams Are Not Ready for the Cloud
 
CompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in ReviewCompTIA 2014 IT Trends in Review
CompTIA 2014 IT Trends in Review
 
CompTIA: Trends in Cloud Computing
CompTIA: Trends in Cloud ComputingCompTIA: Trends in Cloud Computing
CompTIA: Trends in Cloud Computing
 
CompTIA Research Roundup - IT Channel Insights & Opportunities
CompTIA Research Roundup - IT Channel Insights & OpportunitiesCompTIA Research Roundup - IT Channel Insights & Opportunities
CompTIA Research Roundup - IT Channel Insights & Opportunities
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

Netop VPN survey final report

  • 1. Netop – VPN Survey Deployed to Spiceworks Voice of IT panel in February 2014; 192 respondents in the United States
  • 2. Executive Summary IN THIS REPORT Configuring a New VPN 3 Time Spent Maintaining Existing VPNs 4 Type of VPN Solution 5 Accessing Applications 6 Vendor Access to Network 7 Types of Authentication 8 Number of Remote Devices Supported 9 Effectiveness of Current VPN Solution 10 Limitations of VPNs 11 Interest in an Alternative VPN Solution 12 Respondent Profile 13 In February 2014, Spiceworks Voice of IT surveyed 192 IT pros in the US to learn how they manage VPN and the challenges experienced with their current solution. To qualify for the survey, they must be the person responsible for managing or supporting their organization’s VPN solution. Key findings of this report include: • Roughly three-quarters of respondents have set up a VPN in the past year. • The majority state their organization uses a firewall based service for their VPN solution, while 26% use a server based service. Further, most employ Internet Protocol Security (IPsec) (68%) and / or Transport Layer Security (SSL/TLS) (52%) for a VPN security protocol. • Respondents are evenly split on whether they allow their vendors and / or trusted third parties VPN access to their organization’s network. Nearly two-thirds of the respondents who allow VPN access state their vendors can access department-specific business applications (i.e. database software, accounting software). • Three-quarters believe their VPN solution is very to extremely effective at providing employees remote access to their organization’s intranet. Respondents also feel it’s very to extremely effective at connecting multiple locations (63%) and pulling data for reports (47%). • When asked about the greatest limitations of VPNs, nearly half state that the difficulty for employees to connect remotely is the greatest limitation. Other limitations are reliability of connection (35%), degree of expertise needed to configure (27%) and logging use (26%). • When asked how interested they would be in a product that replicates the functions of a VPN (but is easier to use and maintain), 47% indicate they’re somewhat interested, and 14% are very to extremely interested. The following pages provide detailed findings for all questions in the study. About Spiceworks Voice of IT® The Spiceworks Voice of IT® market insights program publishes stats, trends and opinions collected from small and medium business technology professionals who are among the more than 2.5M users of Spiceworks. Survey panelists opt-in to answer questions on technology trends important to them. To use data from this report, visit: www.spiceworks.com/voice-of-it/terms 2
  • 3. To qualify for the survey, respondents must be the person responsible for managing or supporting their organization’s VPN solution. Of those who qualified, roughly three-quarters (76%) state they’ve set up a VPN in the past year. However, 24% state they haven’t set one up in the past year. When asked how much time they estimate it would take to configure a new VPN, 31% believe it would take less than 15 minutes, 17% indicate 15 to 29 minutes, 29% indicate 30 minutes to an hour, and 17% indicate it would take more than an hour. Have you set up a VPN in the past year? Configuring a New VPN Respondents = 191 3 Yes 76% No 24% Respondents = 192 How much time do you estimate it would take you to configure a new VPN? 6% 17% 29% 17% 23% 8% 0% 10% 20% 30% 40% Don’t know More than an hour 30 minutes to an hour 15 to 29 minutes 5 to 14 minutes Less than 5 minutes
  • 4. Time Spent Maintaining Existing VPNs When it comes to maintaining existing VPNs and managing user rights pertaining to VPNs, more than two-thirds (69%) state it takes less than an hour each month, while 26% indicate one to four hours, and 4% indicate more than four hours each month. How much time do you spend each month maintaining existing VPNs and managing user rights pertaining to VPNs? Respondents = 192 4 1% 1% 3% 26% 69% 0% 10% 20% 30% 40% 50% 60% 70% 80% Don't know More than 10 hours each month 4 to 10 hours each month 1 to 4 hours each month Less than an hour each month
  • 5. Type of VPN Solution The majority of respondents (72%) state their organization uses a firewall based service for their VPN solution, while 26% use a server based service. Most respondents state their organization uses Internet Protocol Security (IPsec) (68%) and / or Transport Layer Security (SSL/TLS) (52%). Other protocols used are Secure Shell VPN (SSH) (20%) and Microsoft Point-to-Point Tunneling Protocol (17%). What type of VPN solution does your company use? (Select all that apply.) Respondents = 192 Which of the following VPN security protocols does your company employ? (Select all that apply.) Respondents = 191 5 6% 7% 26% 72% 0% 20% 40% 60% 80% Other External VPN Service Provider Server based service Firewall based service 3% 1% 2% 6% 17% 20% 52% 68% 0% 10% 20% 30% 40% 50% 60% 70% 80% Other Multi Path Virtual Private Network (MPVPN) Datagram Transport Layer Security (DTLS) Microsoft Secure Socket Tunneling Protocol Microsoft Point-to-Point Tunneling Protocol Secure Shell VPN (SSH) Transport Layer Security (SSL/TLS) Internet Protocol Security (IPsec)
  • 6. Respondents = 191 The majority of respondents state their organization’s employees use the VPN tunnel for file sharing (80%) and department specific (72%) applications. Other applications include Email (50%) and Internal web portal (40%). Sixteen percent indicate “other,” and these verbatim responses are included in the Excel file provided. What applications do your employees use through your VPN tunnel? (Select all that apply.) Accessing Applications 6 16% 20% 21% 40% 50% 72% 80% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% Other Collaboration software (i.e. SharePoint) Communication software (i.e. IM tool) Internal web portal Email Department-specific (i.e. database software, accounting software) File sharing
  • 7. Vendor Access to Network Respondents are evenly split on whether they allow any of their vendors and / or trusted third parties VPN access to their organization’s network. Of the 50% of respondents who allow VPN access, 65% allow vendors access to department-specific business applications (i.e. database software, accounting software). Other programs or systems are FTP / other file sharing (32%) and collaboration software (19%). Twenty-two percent indicate “other,” and these verbatim responses are included in the Excel file provided. Do you allow any of your vendors and/or trusted 3rd parties VPN access to your network? Respondents = 192 What programs or systems are the vendors accessing? (Select all that apply.) Respondents = 95 7 Of IT pros who indicate vendors / 3rd parties have access Yes 50% No 50% 22% 8% 14% 14% 19% 32% 65% 0% 10% 20% 30% 40% 50% 60% 70% Other Point of sale systems Email HVAC, building automation or other facilities systems Collaboration software FTP / Other file sharing Department-specific business applications
  • 8. Types of Authentication Nearly all respondents (93%) use passwords for authentication, while an additional 29% use two-factor authentication. Further, the majority (89%) state this authentication is standardized across all VPNs in their organization. What types of authentication do you use with VPN connections? (Select all that apply.) Respondents = 191 Is authentication standardized across all VPNs in your organization? Respondents = 191 8 3% 1% 29% 93% 0% 20% 40% 60% 80% 100% Other Biometrics Two-factor authentication Passwords Yes 89% No 11%
  • 9. Respondents = 191 When asked how many remote devices they support, three-quarters indicate they support one to 100 remote devices. However, 20% support more than 100 devices, and 4% indicate they don’t support remote devices. How many remote devices do you and your team support? Number of Remote Devices Supported 9 4% 75% 17% 3% 1% 0% 10% 20% 30% 40% 50% 60% 70% 80% None 1-100 101-1000 More than 1000 Don't know
  • 10. Respondents = 186-188 Three-quarters of respondents believe their VPN solution is very to extremely effective at providing employees remote access to their organization’s intranet. Respondents also feel it’s very to extremely effective at connecting multiple locations (63%) and pulling data for reports (47%). Using a scale of 1 to 5, where 1 is not at all effective and 5 is extremely effective, please rank how effective your VPN solution is at the following: Effectiveness of Current VPN Solution Weighted Average Top Two (Very to extremely effective) Bottom Two (Not very to not at all effective) Not applicable Providing access to our intranet to employees when away from the office 75% 3% 9% Connecting multiple geographic locations 63% 5% 24% Pulling data for reports 47% 14% 19% Extending GUIs to end users 42% 10% 35% Connecting unattended devices 34% 11% 35% Accessing a VOIP system 23% 14% 52% Scale: (1) Not at all effective, (2) Not very effective, (3) Somewhat effective, (4) Very effective, (5) Extremely effective 10 1.6 2.3 2.4 3.0 3.2 3.9 0.0 1.0 2.0 3.0 4.0 5.0 Accessing a VOIP system Connecting unattended devices Extending GUIs to end users Pulling data for reports Connecting multiple geographic locations Providing access to our intranet to employees when away from the office
  • 11. Respondents = 184 Nearly half (47%) state that the difficulty for employees to connect remotely is the greatest limitation of VPNs. Other limitations are reliability of connection (35%), degree of expertise needed to configure (27%) and logging use (26%). Which of the following do you consider to be the greatest limitation of VPNs? (Select all that apply.) Limitations of VPNs 11 47% 35% 27% 26% 22% 22% 20% 8% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Employee difficulty connecting remotely Reliability of connection Degree of expertise needed to configure Logging use Ease of use Level of security Managing user access rights Other
  • 12. When asked how interested they would be in a product that replicates the functions of a VPN (but is easier to use and maintain), 47% indicate they’re somewhat interested, and 14% are very to extremely interested. However, 39% indicate they’re not at all to not very interested. How interested would you be in a product that replicated the functions of a VPN but was easier to use and maintain and allowed port-specific access? Interest in an Alternative VPN Solution Respondents = 192 12 16% 23% 47% 9% 5% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Not at all interested Not very interested Somewhat interested Very interested Extremely interested
  • 13. Respondent Profile Company Size Industry Total = 192 Top 16 industries are shown Total = 192 13 5% 8% 8% 30% 35% 14% 0% 10% 20% 30% 40% 1000 or more 500-999 250-499 100-249 20-99 1-19 2% 2% 3% 3% 3% 3% 3% 5% 5% 6% 6% 7% 7% 9% 10% 16% 0% 5% 10% 15% 20% Insurance Transportation Construction Software Consulting Energy Legal Education Retail Engineering Finance Government Non profit IT service provider Healthcare Manufacturing
  • 14. Copyright Notice The contents of this report are a result of primary research performed by Spiceworks. Unless otherwise noted, the entire contents distributed as part of this report are copyrighted by Spiceworks. As such any information made available by any means in this report may not be copied, reproduced, duplicated, published, displayed, transmitted, distributed, given, sold, traded, resold, marketed, offered for sale, modified to create derivative works or otherwise exploited for valuable consideration without prior written consent by Spiceworks. For information about using data from this report visit, go to www.spiceworks.com/voice-of-it/terms. This report contains information of fact relating to parties other than Spiceworks. Although the information have been obtained from, and are based on sources that Spiceworks believes to be reliable, Spiceworks does not guarantee the accuracy, and any such information might be incomplete or condensed. Any estimates included in this report constitute Spiceworks’ judgment as of the date of compilation, and are subject to change without notice. This report is for information purposes only. All responsibility for any interpretations or actions based on the information or commentary contained within this report lies solely with the recipient. All rights reserved. 2014. 14